About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Multimedia Technology and Enhanced Learning. Second EAI International Conference, ICMTEL 2020, Leicester, UK, April 10-11, 2020, Proceedings, Part I

Research Article

Data Mining Method of Malicious Attack Based on Characteristic Frequency

Download(Requires a free EAI acccount)
2 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-51100-5_36,
        author={Jia Luo and Chan Zhang},
        title={Data Mining Method of Malicious Attack Based on Characteristic Frequency},
        proceedings={Multimedia Technology and Enhanced Learning. Second EAI International Conference, ICMTEL 2020, Leicester, UK, April 10-11, 2020, Proceedings, Part I},
        proceedings_a={ICMTEL},
        year={2020},
        month={7},
        keywords={Feature frequency Malicious attack Data mining Spatial mapping principle},
        doi={10.1007/978-3-030-51100-5_36}
    }
    
  • Jia Luo
    Chan Zhang
    Year: 2020
    Data Mining Method of Malicious Attack Based on Characteristic Frequency
    ICMTEL
    Springer
    DOI: 10.1007/978-3-030-51100-5_36
Jia Luo1,*, Chan Zhang1
  • 1: School of Information Technology
*Contact email: luojia314@163.com

Abstract

Aiming at the problem of high false alarm rate and failure rate in traditional data mining methods of malicious attacks, a data mining method of malicious attacks based on characteristic frequency is designed. Preprocess the original data in the data set, select the minimum attribute subset, use the discretization to process the unified data format, take the new subset as the input of feature frequency extraction of malicious attack data, extract the feature frequency according to the different protocols of malicious attack data transmission, integrate it into the value data mining algorithm, and use the spatial mapping principle to realize the malicious attack data excavate. The experimental results show that: compared with the traditional data mining method, the false alarm rate and failure rate of the designed malicious attack data mining method based on the feature frequency are reduced by 0.3 and 0.2 respectively, which shows that the method is more suitable for practical projects.

Keywords
Feature frequency Malicious attack Data mining Spatial mapping principle
Published
2020-07-19
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-51100-5_36
Copyright © 2020–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL